September 25, 2017 Businesses Must Innovate to Ensure High Levels of Data Protection 3 min read - IT decision-makers must develop a strong cybersecurity strategy that uses analytics and innovation to create an integrated approach to data protection.
Data Protection September 20, 2017 GDPR Readiness: From Mission Impossible to Mission Accomplished 4 min read - GDPR readiness starts with a solid understanding of what Personal Data looks like, where it is located, who is accessing it and who wants to compromise it.
Data Protection September 14, 2017 See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management 3 min read - A risk-focused data management program can help companies identify and protect their prized assets from attackers aiming to steal, publish or destroy them.
Data Protection September 12, 2017 Think You Have Plenty of Time to Plan for GDPR? Think Again 4 min read - The deadline to achieve compliance with the General Data Protection Regulation (GDPR) is fast approaching, but many companies remain unprepared.
Data Protection September 5, 2017 The Time for IT Asset Management Is Now 3 min read - Due to the rapidly shifting technology landscape, a robust, dynamic and well-funded IT asset management program is a prerequisite to success in business.
Threat Intelligence August 30, 2017 The Educator’s Back-to-School Cybersecurity Checklist: Make Mitigating Command Injection a Priority 3 min read - To protect students, parents and teachers from data theft, academic institutions must adopt comprehensive strategies to mitigate command injection attacks.
August 29, 2017 IBM Announces New Guardium Data Encryption v3.0 Portfolio 2 min read - The latest version of Guardium Data Encryption allows many different types of organizations to protect data by making the data less accessible.
Data Protection August 29, 2017 Need-to-Know Only: Use Encryption to Make Data Meaningless to Prying Eyes 3 min read - Data encryption is one of the most basic — and, given the right tools, most effective — ways to protect sensitive information from cybercriminals.
Data Protection August 28, 2017 Location! Location! Location! Managing and Protecting Critical Data in the Age of Sprawl 4 min read - The digital age has created data sprawl, which complicates how organizations locate, classify and secure their critical data.
Data Protection August 22, 2017 Leading by Example: Security and Privacy in the Education Sector 5 min read - Today's students must grapple with security and privacy issues, such as identity theft and financial fraud, that could affect them well past graduation.